General
-
Target
f21f222d8f62f2223faec375e834efb76f96b73ef70e0ef09024586cf9eef638
-
Size
153KB
-
Sample
220220-aqw4zsehe4
-
MD5
61e6ce03440b0f92dbec5c1a519afa23
-
SHA1
4579e18d96e6f00cce267cc64513e8689546da7a
-
SHA256
f21f222d8f62f2223faec375e834efb76f96b73ef70e0ef09024586cf9eef638
-
SHA512
e1aa4eb1b63d1cf8815c263c705407cffa90f024f8db8859b8a6969339f9a444c42cfe3f2c84f6474fb90cbfc8f571b177a941d86f184e4c322598bb9492176c
Static task
static1
Behavioral task
behavioral1
Sample
f21f222d8f62f2223faec375e834efb76f96b73ef70e0ef09024586cf9eef638.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
f21f222d8f62f2223faec375e834efb76f96b73ef70e0ef09024586cf9eef638.exe
Resource
win10v2004-en-20220112
Malware Config
Extracted
C:\RyukReadMe.txt
ryuk
1ChnbV4Rt7nsb5acw5YfYyvBFDj1RXcVQu
Targets
-
-
Target
f21f222d8f62f2223faec375e834efb76f96b73ef70e0ef09024586cf9eef638
-
Size
153KB
-
MD5
61e6ce03440b0f92dbec5c1a519afa23
-
SHA1
4579e18d96e6f00cce267cc64513e8689546da7a
-
SHA256
f21f222d8f62f2223faec375e834efb76f96b73ef70e0ef09024586cf9eef638
-
SHA512
e1aa4eb1b63d1cf8815c263c705407cffa90f024f8db8859b8a6969339f9a444c42cfe3f2c84f6474fb90cbfc8f571b177a941d86f184e4c322598bb9492176c
Score10/10-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-